ALT-BU-2015-2562-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2015-12237
Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00941
Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00942
Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2014-8500
ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
- http://advisories.mageia.org/MGASA-2014-0524.html
- http://advisories.mageia.org/MGASA-2014-0524.html
- http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html
- http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html
- NetBSD-SA2015-002
- NetBSD-SA2015-002
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10676
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10676
- APPLE-SA-2015-09-16-4
- APPLE-SA-2015-09-16-4
- SUSE-SU-2015:0011
- SUSE-SU-2015:0011
- SUSE-SU-2015:0096
- SUSE-SU-2015:0096
- SUSE-SU-2015:0480
- SUSE-SU-2015:0480
- SUSE-SU-2015:0488
- SUSE-SU-2015:0488
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03235
- HPSBUX03235
- SSRT101750
- SSRT101750
- HPSBUX03400
- HPSBUX03400
- SSRT102211
- SSRT102211
- RHSA-2016:0078
- RHSA-2016:0078
- 62064
- 62064
- 62122
- 62122
- GLSA-201502-03
- GLSA-201502-03
- 1031311
- 1031311
- USN-2437-1
- USN-2437-1
- DSA-3094
- DSA-3094
- VU#264212
- VU#264212
- MDVSA-2015:165
- MDVSA-2015:165
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 71590
- 71590
- https://kb.isc.org/article/AA-01216/
- https://kb.isc.org/article/AA-01216/
- https://security.netapp.com/advisory/ntap-20190730-0002/
- https://security.netapp.com/advisory/ntap-20190730-0002/
- https://support.apple.com/HT205219
- https://support.apple.com/HT205219
Modified: 2024-11-21
CVE-2015-1349
named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
- http://advisories.mageia.org/MGASA-2015-0082.html
- http://advisories.mageia.org/MGASA-2015-0082.html
- APPLE-SA-2015-09-16-4
- APPLE-SA-2015-09-16-4
- FEDORA-2015-2543
- FEDORA-2015-2543
- FEDORA-2015-2548
- FEDORA-2015-2548
- SUSE-SU-2015:1205
- SUSE-SU-2015:1205
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03379
- HPSBUX03379
- SSRT101976
- SSRT101976
- RHSA-2015:0672
- RHSA-2015:0672
- MDVSA-2015:054
- MDVSA-2015:054
- MDVSA-2015:165
- MDVSA-2015:165
- USN-2503-1
- USN-2503-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1193820
- https://bugzilla.redhat.com/show_bug.cgi?id=1193820
- https://kb.isc.org/article/AA-01235
- https://kb.isc.org/article/AA-01235
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10116
- https://kc.mcafee.com/corporate/index?page=content&id=SB10116
- GLSA-201510-01
- GLSA-201510-01
- https://support.apple.com/HT205219
- https://support.apple.com/HT205219
Modified: 2024-11-21
CVE-2015-4620
name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
- FEDORA-2015-11483
- FEDORA-2015-11483
- FEDORA-2015-11484
- FEDORA-2015-11484
- SUSE-SU-2015:1205
- SUSE-SU-2015:1205
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03379
- HPSBUX03379
- SSRT101976
- SSRT101976
- RHSA-2015:1443
- RHSA-2015:1443
- RHSA-2015:1471
- RHSA-2015:1471
- DSA-3304
- DSA-3304
- 75588
- 75588
- 1032799
- 1032799
- USN-2669-1
- USN-2669-1
- https://kb.isc.org/article/AA-01267
- https://kb.isc.org/article/AA-01267
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10124
- https://kc.mcafee.com/corporate/index?page=content&id=SB10124
- GLSA-201510-01
- GLSA-201510-01
- https://security.netapp.com/advisory/ntap-20190903-0003/
- https://security.netapp.com/advisory/ntap-20190903-0003/
Modified: 2024-11-21
CVE-2015-5477
named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
- FEDORA-2015-12335
- FEDORA-2015-12335
- FEDORA-2015-12357
- FEDORA-2015-12357
- FEDORA-2015-12316
- FEDORA-2015-12316
- SUSE-SU-2015:1304
- SUSE-SU-2015:1304
- SUSE-SU-2015:1305
- SUSE-SU-2015:1305
- SUSE-SU-2015:1316
- SUSE-SU-2015:1316
- SUSE-SU-2015:1322
- SUSE-SU-2015:1322
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1335
- openSUSE-SU-2015:1335
- SUSE-SU-2016:0227
- SUSE-SU-2016:0227
- HPSBUX03400
- HPSBUX03400
- SSRT102211
- SSRT102211
- HPSBUX03410
- HPSBUX03410
- SSRT102175
- SSRT102175
- HPSBOV03506
- HPSBOV03506
- HPSBUX03511
- HPSBUX03511
- SSRT102248
- SSRT102248
- http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
- http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
- RHSA-2015:1513
- RHSA-2015:1513
- RHSA-2015:1514
- RHSA-2015:1514
- RHSA-2015:1515
- RHSA-2015:1515
- RHSA-2016:0078
- RHSA-2016:0078
- RHSA-2016:0079
- RHSA-2016:0079
- DSA-3319
- DSA-3319
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 76092
- 76092
- 1033100
- 1033100
- USN-2693-1
- USN-2693-1
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918
- https://kb.isc.org/article/AA-01272
- https://kb.isc.org/article/AA-01272
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10126
- https://kc.mcafee.com/corporate/index?page=content&id=SB10126
- GLSA-201510-01
- GLSA-201510-01
- https://security.netapp.com/advisory/ntap-20160114-0001/
- https://security.netapp.com/advisory/ntap-20160114-0001/
- https://support.apple.com/kb/HT205032
- https://support.apple.com/kb/HT205032
- 37721
- 37721
- 37723
- 37723
Modified: 2024-11-21
CVE-2015-8000
db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
- FEDORA-2015-40882ddfb1
- FEDORA-2015-40882ddfb1
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-2df40de264
- FEDORA-2015-2df40de264
- FEDORA-2015-e278e12ebc
- FEDORA-2015-e278e12ebc
- SUSE-SU-2015:2340
- SUSE-SU-2015:2340
- SUSE-SU-2015:2341
- SUSE-SU-2015:2341
- SUSE-SU-2015:2359
- SUSE-SU-2015:2359
- openSUSE-SU-2015:2364
- openSUSE-SU-2015:2364
- openSUSE-SU-2015:2365
- openSUSE-SU-2015:2365
- openSUSE-SU-2015:2391
- openSUSE-SU-2015:2391
- SUSE-SU-2016:0227
- SUSE-SU-2016:0227
- HPSBUX03552
- HPSBUX03552
- SSRT102983
- SSRT102983
- http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html
- http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html
- RHSA-2015:2655
- RHSA-2015:2655
- RHSA-2015:2656
- RHSA-2015:2656
- RHSA-2015:2658
- RHSA-2015:2658
- RHSA-2016:0078
- RHSA-2016:0078
- RHSA-2016:0079
- RHSA-2016:0079
- DSA-3420
- DSA-3420
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 79349
- 79349
- 1034418
- 1034418
- SSA:2015-349-01
- SSA:2015-349-01
- USN-2837-1
- USN-2837-1
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923105
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923105
- https://kb.isc.org/article/AA-01317
- https://kb.isc.org/article/AA-01317
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
Modified: 2024-11-21
CVE-2015-8461
Race condition in resolver.c in named in ISC BIND 9.9.8 before 9.9.8-P2 and 9.10.3 before 9.10.3-P2 allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via unspecified vectors.
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-2df40de264
- FEDORA-2015-2df40de264
- 79347
- 79347
- 1034419
- 1034419
- SSA:2015-349-01
- SSA:2015-349-01
- https://kb.isc.org/article/AA-01319
- https://kb.isc.org/article/AA-01319
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
Modified: 2024-11-21
CVE-2016-1285
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
- FEDORA-2016-364c0a9df4
- FEDORA-2016-364c0a9df4
- FEDORA-2016-161b73fc2c
- FEDORA-2016-161b73fc2c
- FEDORA-2016-b593e84223
- FEDORA-2016-b593e84223
- FEDORA-2016-5047abe4a9
- FEDORA-2016-5047abe4a9
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-dce6dbe6a8
- FEDORA-2016-dce6dbe6a8
- SUSE-SU-2016:0759
- SUSE-SU-2016:0759
- SUSE-SU-2016:0780
- SUSE-SU-2016:0780
- SUSE-SU-2016:0825
- SUSE-SU-2016:0825
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0859
- openSUSE-SU-2016:0859
- SUSE-SU-2016:1541
- SUSE-SU-2016:1541
- HPSBUX03583
- HPSBUX03583
- SSRT110084
- SSRT110084
- RHSA-2016:0562
- RHSA-2016:0562
- RHSA-2016:0601
- RHSA-2016:0601
- DSA-3511
- DSA-3511
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 1035236
- 1035236
- USN-2925-1
- USN-2925-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://kb.isc.org/article/AA-01352
- https://kb.isc.org/article/AA-01352
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FreeBSD-SA-16:13
- FreeBSD-SA-16:13
- GLSA-201610-07
- GLSA-201610-07
Modified: 2024-11-21
CVE-2016-1286
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
- FEDORA-2016-364c0a9df4
- FEDORA-2016-364c0a9df4
- FEDORA-2016-161b73fc2c
- FEDORA-2016-161b73fc2c
- FEDORA-2016-b593e84223
- FEDORA-2016-b593e84223
- FEDORA-2016-5047abe4a9
- FEDORA-2016-5047abe4a9
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-dce6dbe6a8
- FEDORA-2016-dce6dbe6a8
- SUSE-SU-2016:0759
- SUSE-SU-2016:0759
- SUSE-SU-2016:0780
- SUSE-SU-2016:0780
- SUSE-SU-2016:0825
- SUSE-SU-2016:0825
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0859
- openSUSE-SU-2016:0859
- SUSE-SU-2016:1541
- SUSE-SU-2016:1541
- HPSBUX03583
- HPSBUX03583
- SSRT110084
- SSRT110084
- RHSA-2016:0562
- RHSA-2016:0562
- RHSA-2016:0601
- RHSA-2016:0601
- DSA-3511
- DSA-3511
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 1035237
- 1035237
- USN-2925-1
- USN-2925-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://kb.isc.org/article/AA-01353
- https://kb.isc.org/article/AA-01353
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FreeBSD-SA-16:13
- FreeBSD-SA-16:13
- GLSA-201610-07
- GLSA-201610-07
Package kernel-modules-nvidia-std-def updated to version 346.87-alt1.200240.1 for branch sisyphus in task 146830.
Closed vulnerabilities
BDU:2015-12100
Уязвимость программного обеспечения графического процессора NVIDIA GPU, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-5053
The host memory mapping path feature in the NVIDIA GPU graphics driver R346 before 346.87 and R352 before 352.41 for Linux and R352 before 352.46 for GRID vGPU and vSGA does not properly restrict access to third-party device IO memory, which allows attackers to gain privileges, cause a denial of service (resource consumption), or possibly have unspecified other impact via unknown vectors related to the follow_pfn kernel-mode API call.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-0487
ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session.
Modified: 2024-11-21
CVE-2018-0488
ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0, when the truncated HMAC extension and CBC are used, allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption) via a crafted application packet within a TLS or DTLS session.